6.033 | Spring 2018 | Undergraduate
Computer System Engineering

Week 14: Security Part IV

Lecture 25: Tor

Lecture 25 Outline

  1. Introduction
  2. Cryptography Review
  3. Tor
  4. Attacks on Tor
  5. Performance
  6. Summary

Lecture Slides

Reading

  • [No readings]

Recitation 25: Meltdown

Lecture 26: Policy vs. Mechanism

Lecture Slides

Reading

Recitation 26: Trusting Trust

END OF CLASSES

Quiz 2

Quiz 2 will last two hours. The quiz will cover all the material starting from Lecture 14 up to and including Recitation 25 (Meltdown). We will not explicitly test you on any material from the last lecture and recitation (L26, R26). Note, though, that much of the content during those sessions will tie together concepts from the rest of the class, which will be useful on Quiz 2.

The quiz will be “open book.” That means you can bring along any printed or written materials that you think might be useful. Calculators are allowed, though typically not necessary. You may also bring a laptop to view, e.g., PDF versions of papers and notes, but you may not connect to any network; make sure you download the papers to your laptop before the quiz. Charge your laptops before you come; we cannot guarantee outlet availability.

Course Info
Instructor
As Taught In
Spring 2018
Learning Resource Types
notes Lecture Notes
assignment Written Assignments
group_work Projects with Examples
co_present Instructor Insights